Test 1 Pt. 3

Test 1 Pt. 3

BCIS II test 1 review Using MIS & Project 2010 Chapters 1-5 in MIS & Project

published on October 09, 2012
1/20

The IEEE 802.3 and 802.11 protocols ___.

are protocols for browsers and Web servers
concern data transmission within a network
operate at the application layer of TCP/IP architecture
operate at the transport layer of TCP/IP architecture
2/20

A ticket from L.A. to Denver costs $212. In a decision-making scenario, this would be an example of ___.

an interpretation
information
an inference
data
3/20

Minimum cardinalities are ___.

the attributes identified with only one entity
the lowest possible data attributes in an entity
crow's feet notations showing the least number of relationships
minimum requirements of the number entities
4/20

Identify a situation where rivalry would be a weak force.

book sellers
packaged food manufacturers
internal revenue service
used car dealers
5/20

IEEE 802.11 protocol allows speeds of up to ___.

27 Mbps
10 Mbps
99 Mbps
54 Mbps
6/20

Which of the following is true about the database development process?

User review of the data model is avoided as it is not helpful in
data modeling.
Changing a relationship from 1:N to N:M is simply a matter of
changing the notations.
The database structure cannot be changed during the data
modeling stage.
A database is a model of how the developers view their
business world.
7/20

Which of the following is true of DSL modems?

DSL modems use the same protocols as cable modems.
DSL services and speed are standardized across applications.
DSL modems use cable lines for data transmission.
The signals of DSL modems do not interfere with voice
telephone service
8/20

___ is a popular commercial webinar product used in virtual sales presentations.

Microsoft SharePoint
WebEx
MS Access
Google Docs
9/20

A ___ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol.

router
firewire
modem
switch
10/20

The difference between the value that an activity generates and the cost of the activity is called the ____.

revenue
value-addition
margin
break-even point
11/20

Which of the following is an asynchronous communication technology where it is easy to identify the people who have not responded to a request?

email
discussion forums
wikis
surveys
12/20

Which device listed below is an example of a storage hardware device?

scanner
plotter
RAM
optical disk
13/20

Which of the following is an example of computer hardware?

data in a USB drive
a user manual
a spreadsheet
a computer monitor
14/20

Which of the following statements is true regarding collaborative systems?

Content management facilitates collaboration though it is not a
key driver of collaboration.
Members have different rights and privileges in some
collaboration.
The three collaboration drivers are equally important for all
types of collaborations.
Creating and formalizing workflows is the most critical
collaborative task for ad hoc work groups.
15/20

A ___ is a column or group of columns that identifies a unique row in a table

field
record
key
column
16/20

Which of the following is an appropriate technique for creating memorabe, strong passwords?

use your favorite foreign words
use a collection of randomly selected letters, numbers, and
special characters
base them on the first letters of the words in a phrase
base them on little known personal details such as a favorite
object or place
17/20

Asynchronous communication occurs when team members ___.

communicate in a sequential manner
communicate within a specific time frame
engage in conflicting discussions
do not meet at the same time
18/20

Which of the following activities of a computer manufacturer cannot be considered a part of inbound logistics?

finished goods inventory
raw materials inventory
payment of raw materials
exchanges with vendors
19/20

Which of the following statements is true of firmware?

Firmware is the same as system cache.
Firmware cannot be changed or upgraded.
The software is coded differently from other software.
Users do not need to load firmware into the device's memory.
20/20

Which of the following licensing systems is used by most open source programs?

GNU general public license
freeware
single use license
site license